CVE-2019-11409
HIGHFusionPBX 4.4.3 - Command Injection
Title source: llmDescription
app/operator_panel/exec.php in the Operator Panel module in FusionPBX 4.4.3 suffers from a command injection vulnerability due to a lack of input validation that allows authenticated non-administrative attackers to execute commands on the host. This can further lead to remote code execution when combined with an XSS vulnerability also present in the FusionPBX Operator Panel module.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/47697
metasploit
WORKING POC
EXCELLENT
by Dustin Cobb, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/fusionpbx_operator_panel_exec_cmd_exec.rb
References (4)
Scores
CVSS v3
8.8
EPSS
0.8650
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
fusionpbx/fusionpbx
4.4.3
Published
Jun 17, 2019
Tracked Since
Feb 18, 2026